1.3.2 Wired and wireless networks, protocols and layers

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Wired connections use physical cables (copper or fibre optic)

requires a NIC

They use a wired connection protocol - usually ethernet.

What are the advantages and disadvantages of wired connections?

advantages

  • faster transmission due to greater bandwidth

  • more reliable as there is a physical cable rather than a wireless signal - less prone to interference

  • more secure - physical connection would be needed to intercept data - attacker would have to be on premises

disadvantages

  • expensive - cables need to be purchased for each new connection - require more space as well

  • and harder and more time consuming to install - require technical knowledge

  • restricted movement and potential trip hazards - legal issues

2
New cards

Wireless connection (wifi and bluetooth)

use radio waves and require a WNIC.

What are the advantages and disadvantages of wireless networks?

advantages

  • cheaper to install - only need to purchase a router and a few access points

  • easier and quicker to add new devices - quicker expansion and providing services - also more accessible and welcoming

  • freedom of movement - can easily roam with devices

disadvantages

  • slower speed - less bandwith available

  • less reliable - other network hardware may reduce signal strength as well as interference from any obstacle and distance from access point

  • less secure - signal cannot be contained so data can be intercepted without authorised users knowing

3
New cards

wired and wireless connections together

  • allows permanent devices to have a more secure and reliable connection

  • personal and guest devices can be easily connected

  • allows for flexibility of wireless and reliability of wired as needed

  • more costly to install as both infrastructures are required

4
New cards

When would a wired network be most suitable?

  • if the devices are unlikely to need to move

5
New cards

When would a wireless network be most suitable?

  • if the devices are likely to need to move

6
New cards

What is encryption and why is it needed?

  • the encoding of data (plaintext) using a key so that it can no longer be understood (ciphertext)

  • a key is a sequence of numbers (often a formula) that can be used to encrypt or decrypt

  • it is needed as data transmitted over a network can be intercepted - encryption prevents unauthorised users understanding it

  • important in protecting confidential info from being accessed (to folllow legislation)

7
New cards

What is symmetrical encryption?

  • a single private key is used to encrypt and decrypt a message

  • the same key must be given to the recipient to use to decrypt

8
New cards

what is asymmetric encrption?

  • two keys are used - one public key to encrypt and the other private key to decrypt

  • more secure - you never have to reveal your decryption key

  • anyone can use public key to encypt but only the private key of the recipient can decypt

9
New cards

What are the features of WEP and WPA?

  • both are wireless encyption standards

WEP

  • older

  • easily broken

  • no longer used

WPA

  • newer

  • harder to break

  • more widely used now

10
New cards

When is encryption considered strong?

  • the useful lifetime of the data is less than the time taken to decrypt it

11
New cards

When is encyption considered weak?

  • the data can be encypted in time to use the info but wouldn’t be worth the effort trying

12
New cards

What is a networking protocol?

  • a set of rules that govern how communication should happen within a network

13
New cards

What are networking standards?

  • guidelines or specifications that dictate how certain technologies should operate

  • created to ensure devices are compatible

  • ethernet (e.g) - used by mostly all manufacturers in many devices to allow for compatitbility. it became a standard due to high bandwidth, inbuilt security, a proven reliable connection low cost for installation compared to other wired connections etc

14
New cards

What are the advantages and disadvantages of 2.4GHz?

advanatages

  • greater range and coverage

disadvantages

  • more interference from other devices as it is a crowded frequency

  • lower data transmission rates

15
New cards

What are the advantages and disadvantages of 5GHz?

advantages

  • less crowded space - 23 non overlapping channels

  • higher transmission rates

disadvantages

  • less able to penetrate walls

16
New cards

What are the features of MAC addresses?

  • e.g 00:4e:64:e3:9f:22

  • 48 bit hex numbers - each pair is 8 bit

  • assigned to each NIC as a serial number

  • only used within a LAN to route packets

  • cannot change

17
New cards

What are the features of IP addresses?

each device is given a unique IP address when connected to a network

used for routing packets across internet

IPv4

  • uses a numeric dot decimal notation - 4 sets of denary numbers seperated by 3 dots.

  • max value 255 for each set

  • 32 bit - 4 billion unique addresses

IPv6

  • 8 sets of 4 digits of hex

  • 128 bit - each set is 16 bit

  • seperated by colons

18
New cards

What is HTTP/S used for?

  • to transfer web pages over the internet so that users can view them in a web browser

  • HTTPS is the more secure version as it uses encryption

19
New cards

What is FTP used for?

  • used to transfer files over a network

  • commonly used to upload or download files to and from a web server

20
New cards

What is SMTP used for?

  • used to send emails to a mail server and between mail servers

  • email software sends the email to the SMTP server used by the company or individual.

  • The mail server then relays the message through various other mail servers.

  • The email arrives at the destination mail server

21
New cards

What are POP and IMAP used for

both are used for receiving and storing emails from a mail server

POP

  • will download every new message to your local device and remove it from the mail server.

IMAP

  • syncs the message with the mail server so it can be accessed by different devices

  • only removed if the user deletes them

22
New cards

What are TCP and IP used for?

TCP

  • allows packets to be sent and received between computer systems

  • breaks up data to be sent into packets and reassembles them at the destination

  • it also checks for errors and resends lost messages

IP

  • routes and addresses (gives a unique IP address to) individual packets between IP addresses

  • ensures data packets sent across networks are sent to the correct destination

23
New cards

What is the protocol stack?

  • 4 layers that enable communication

  • each layer is a division of network functionality

  • data moves back up the layers upon arrival

24
New cards

What are the roles of each layer?

the application layer -

  • allows humans and software to use the network

  • the application you are using determines the correct protocol to use to communicate and then display the data that has been received to the user

  • HTTP/S, SMTP, FTP

the transport layer -

  • creates the connection between two computers

  • data is then divided into packets and given a packet number

  • packets are reassembled by the recipient’s transport layer

  • TCP

the network(internet) layer -

  • source and destination addresses are written on packet headers and removed by the recipient’s network layer

  • routes the data packets

  • the optimal route for data is calculated in this layer

  • IP

the link layer -

  • sets out format of packets

  • handles transmission errors

  • passes data onto the physical layer - enables transfer of data between nodes

  • ethernet, MAC, WiFi

25
New cards

Why are layers used?

  • self contained- the functionality of one layer can be changed without affecting other layers

  • different hardware or software operates on a

    particular layer providing interoperability between

    providers and systems. manufacturer’s routers operating on the Internet layer, will operate with another manufacturer’s

    Network Interface Cards (NICs) operating on the Link layer. Senders and receivers using different software and hardware

    can communicate using the same layer protocols

26
New cards